SlideShare a Scribd company logo
1 of 40
CHAPTER 1
INFORMATION & COMMUNICATION TECHNOLOGY
AND SOCIETY
DEFINITION OF ICT

ICT  is the technology required for
 information processing, in
 particular, the use electronics
 computers, communication
 devices and application software
 convert, store, protect, process,
 transmit and retrieve information
 from anywhere, anytime.
THE USAGE OF ICT IN
EVERYDAY LIFE
   Education
       Students use computer to research for teaching materials,
        participate in online forum and online conferences
   Banking
       Customers can make any transaction at 24 hours service
        centre
   Industry
       To help in product design by using CAD (Computer Aided
        Design)
   E-commerce
       To make buying and selling activities faster and more
        efficient through internet.
DIFFERENCES BETWEEN COMPUTERISED &
NON-COMPUTERISED SYSTEM
   COMPUTERIZED               NON-COMPUTERIZED
All banking activities are   All banking activities were
done by using computer             done manually
         system
Transaction can be done       Transaction can only be
 anywhere and anytime           made during working
                                        hours
It takes shorten time for    It takes long time for any
  any banking process             banking process
    More productive               Less productive
THE POSITIVE IMPACT OF ICT ON
SOCIETY
 Faster communication speed
 Lower communication cost

 People can share opinions and information through
  discussion groups and forums through Internet
 Paperless environment – information can be stored
  and retrieved through the digital medium instead of
  paper.
 Information can communication can be borderless
  through Internet
THE NEGATIVE IMPACT OF ICT ON
SOCIETY
 Borderless information at time can be negative
  because courage people to access pornography
  and violence web sites.
 Computers can harm users if they use for long
  hours frequently.
2.0 COMPUTER ETHICS AND LEGAL
ISSUES
 Computer    Ethics
    Is a system of moral standards or moral
     values used as a guideline for computer
     users.
 Code of Ethics

    Is a guidelines in ICT that help determine
     whether a specific computer action is
     ethical or unethical
 Intellectual Property

    Is work created by inventors, authors and
     artists.
 Privacy

   Refers to the right of individuals and
    companies to deny or restrict the
    collection and use of information about
    them
 Computer crime

   Is any illegal acts involving computers
 Cyber Law

   Is any laws relating to protect the Internet
    and other online communication
    technologies
DIFFERENCES BETWEEN ETHICS AND
LAW
Ethics                         Law
As a guideline to computer     As a rule to control
users                          computer users
Computer users are free        Computer user must follow
to follow or ignore the code   the regulations and law
of ethics
Universal, can be applied      Depend on country and
anywhere, all over the         state where the crime is
world                          committed
To produce ethical             To prevent misuse of
computer users                 computers
No following ethics are        No obeying laws are call
called immoral                 crime
INTELLECTUAL PROPERTY LAWS
 Intellectual Property laws cover
  ideas, inventions, literary creations, unique
  names, business modals, industrial
  processes, computer program codes and many
  more.
 Four types of Intellectual Property are:

    Patents for inventions
    Trademarks for brand identity
    Design for product appearance
    Copyright for materials
CONTROVERSIAL
CONTENTS AND CONTROL



Pornography   Slander
CONTROVERSIAL CONTENTS AND
CONTROL
   Pornography
     Pornography is any form of media or material
      that show erotic behavior and intended to cause
      sexual excitement. The effects of pornography
      on society are:
        Can lead to criminal acts such as exploitation
         of women.
        Can lead sexual addiction

        can develop lower moral values towards other

         people
        Can erode good religious, cultural, behaviors

         and beliefs
   Slander
     Slander is a false spoken statement about
       someone, intended to damage his or her
       reputation. The effects of slander on society are:
         Can develop society that disregards on

          honesty and truth
         Can lead to bad habits of spreading rumors

          and untruth
         Can cause people to have negative attitudes
          towards another person
TOPICS THAT WE WILL LEARN
        FOR TODAY
   The process of filtering
        Cyber law
THE PROCESS OF FILTERING
 To control access to controversial contents.
 The method of choice to limit access on the Internet
  is to filter either by:
     Keyword blocking
     Site blocking
     Web rating system
KEYWORD BLOCKING
   This method uses a list of banned word or object
    terms such as xxx, sex and nude. As the page is
    downloading, the filter searches for any these
    words. If found, it will blocked the page completely,
    stop downloading the page, block the banned
    words and even shut down the browser.
SITE BLOCKING
   This method use software to list the web sites that
    will be blocked by using software. The software
    also prevents user from being access the web site
    on list.
WEB RATING SYSTEM
   Web sites are rating in terms of nudity, sex,
    violence and language. The web sites rates can be
    done by setting the browser to only accept pages
    with certain level of ratings.
CYBER LAW
 Cyber law is any laws relating to protect the Internet
  and other online communication technologies.
 Examples of cyber abuse on the users:
     Sending a computer virus via e-mail
     Harassment through e-mail
     Hacking into your school’s database to change your
      examination result
   Why we need cyber law:
     Cyber law are made to force people to be good
     To give protection against the misuse of computers and
      computer criminal activities
   Malaysian Cyber Law
       Computer Crime Act 1997
       Copyright (Amendment) Bill 1997
       Digital Signature Act 1997
       Telemedicine Bill 1997
       Communication and Multimedia Act 1998
       Digital Signature Regulations 1998
COMPUTER CRIME
1.   Computer Fraud
2.   Copyright Infringement
3.   Theft
4.   Attacks
COMPUTER FRAUD
   Computer fraud is the crime of obtaining money by
    deceiving (to trick) people through the use of
    computers. There are many forms of computer
    frauds which include
       E-mail hoaxes (hoax – an attempt to make people
        believe something that is not true)
       Program fraud
       Investment scheme
       Sales promotions
       Claim of expertise on certain fields
COPYRIGHT INFRINGEMENT
 Copyright infringement is defined as a violation (an
  action to break the law) of the rights secured by a
  copyright. Copyright is the legal right to be the only
  producer or seller of a book, song and film.
 Infringement of copyright occurs when you break
  the copyright law such as copying movie, software
  or CD’s illegally – selling pirate software.
 Piracy is the crime of illegally copying and selling
  books, tapes, videos, computer programs.
COMPUTER THEFT
   Computer theft is defined as the unauthorized used
    of another person’s property. Example of computer
    theft are
     Transfer of payment to the wrong accounts
     Get online material with no cost
     Tap(memasuki) into data transmission line
COMPUTER ATTACKS
 Computer attack is defined as any activities taken
  to disrupt the equipments computer systems,
  change processing controls and corrupt data.
 Computer attack can be in the forms of:
     Physical attack
     An electronic attack
     A computer network attck
COMPUTER SECURITY
 Computer security means protecting our computer
  system and the information they contain against
  unwanted access, damage, destruction or
  modification.
 Computer security:
     Computer threats
     Security measures
COMPUTER THREATS
 Malicious code
 Hacking

 Natural disaster

 Theft
MALICIOUS CODE
   Malicious code is a computer program that perform
    unauthorised processes on a computer or network.
    There are various kinds of malicious code.
      Virus
      Worm
      Logic bomb : Malicious code that goes off when
       a specific condition occurs. Example: time bomb.
      Trapdoor and backdoor : A feature in a program
       that allows someone to access the program with
       special privileges.
      Trojan horse: program that performs a useful
       task while the same time carry out some secret
       destructive act.
DIFFERENCES BETWEEN WORM &
VIRUS
        WORM                      VIRUS
Operates through the      Spreads through any
network                   medium
Spread copies of itself   Spread copies of itself
as a stand alone          as a program that
program                   attaches to other
                          program
A COMPUTER INFECTED BY A VIRUS,
WORM OR TROJAN HORSE OFTEN HAS
ONE OR MORE OF THE FOLLOWING
SYMPTOMS:
 Screen displays unusual message or image
 Music or unusual sound plays randomly

 Available memory is less than expected

 Existing programs and files disappear

 Files become corrupted
HACKING
 Hacking refer to unauthorized access to the
  computer system by a hacker.
 A hacker is a person who accesses a computer or
  network illegally.
 A cracker also is someone who accesses a
  computer or network illegally but has no intent of
  destroying data, stealing information, or other
  malicious action.
 Both hacker and cracker have advanced computer
  and network skills.
NATURE THREATS
 Computer are also threatened by natural or
  environmental disaster. Be it at home, stores,
  offices and also automobiles.
 Examples of natural and environmental disasters
  are flood, fire, earthquakes, storms, tornados,
  excessive heat and inadequate power.
THEFT
   Two type of theft
     (a) Computer is used to steal money, goods,
         information and resources.
     (b) Stealing of computers especially notebook and
         PDA.

   Three approaches to prevent theft:
    (a) Prevent access by using locks, smart card or
        password.
    (b) Prevent portability by restricting the hardware
        from being moved.
    (c) Detect and guard all exits and record any
        hardware.
SECURITY MEASURES
 Security measures are measures taken as a
  precaution against theft or espionage or sabotage
  or possible danger or failure. Usually we use
  antivirus, cryptography, firewall and data backup to
  protect sensitive information.
 Security procedures:
       Anti-virus
       Anti-spyware
       Firewall
       Backup
       Cryptography
ANTI-VIRUS
 Anti-virus is utility program that we use to protect a
  computer against viruses by identifying and
  removing computer viruses found in the computer
  memory, computer storage or incoming e-mails
  files.
 Examples: Norton antivirus, AVG, Kaspersky,
  Bitdefender and Nod32.
ANTI-SPYWARE
 Anti-spyware is a utility program that we use to
  protect the computers from spyware.
 Spyware is software or computer program that is
  designed secretly record and report an individual’s
  activities on the Internet. Spyware usually enters
  your system through the Internet, sometimes when
  you open e-mail or download software especially
  shareware and freeware.
 Examples : Spybot Search and Destroy, Ad-aware
  and Spyware Blaster.
FIREWALL
 Firewall is a piece of hardware or software which
  functions in a networked environment to prevent
  some communications forbidden by security policy.
 We use firewall to prevent hacking
BACKUP
 Backup is utility program that makes a copy of all
  files or selected files that have been saved onto a
  disk.
 Backup data is important when original data is
  corrupted.
CRYPTOGRAPHY
 Cryptography is a process of transforming plaintext
  into ciphertext then back again.
 Encryption is a process of converting plaintext into
  ciphertext.
 Decryption is the process of converting ciphertext
  into plaintext.
 We use cryptography to secure the information and
  prevent hacking or unauthorized access.
 Cipher = secret language


        Plaintext       encrypt         Ciphertext




        Plaintext        decrypt        Ciphertext
HUMAN ASPECT
   Refer to the user and also the intruder of a
    computer system. Human aspect security is the
    hardest aspects to give protection to. The most
    common problem of human aspect security is the
    lack of achieving a good information security
    procedure.

More Related Content

What's hot

Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2AVISHITYAGI
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 

What's hot (20)

Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Viewers also liked (20)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Manual pengguna membuat sites
Manual pengguna membuat sitesManual pengguna membuat sites
Manual pengguna membuat sites
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Inheritance
InheritanceInheritance
Inheritance
 
Nutrisi
NutrisiNutrisi
Nutrisi
 
Reproduction and Growth
Reproduction and GrowthReproduction and Growth
Reproduction and Growth
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Bab 3 pergerakan bahan2 merentasi membran plasma
Bab 3 pergerakan bahan2 merentasi membran plasmaBab 3 pergerakan bahan2 merentasi membran plasma
Bab 3 pergerakan bahan2 merentasi membran plasma
 
Bab 2 struktur sel dan fungsi
Bab 2  struktur sel dan fungsiBab 2  struktur sel dan fungsi
Bab 2 struktur sel dan fungsi
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Lesson 2.2
Lesson 2.2Lesson 2.2
Lesson 2.2
 
Lesson 3.1 part 2
Lesson 3.1 part 2Lesson 3.1 part 2
Lesson 3.1 part 2
 
Lesson 1.5
Lesson 1.5Lesson 1.5
Lesson 1.5
 
Lesson 3.1 part 2
Lesson 3.1 part 2Lesson 3.1 part 2
Lesson 3.1 part 2
 
Lesson 2.3
Lesson 2.3Lesson 2.3
Lesson 2.3
 
Lesson 1.8
Lesson 1.8Lesson 1.8
Lesson 1.8
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 4.3
Lesson 4.3Lesson 4.3
Lesson 4.3
 
Lesson 8.1
Lesson 8.1Lesson 8.1
Lesson 8.1
 

Similar to Chapter 1

ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxgadisaAdamu
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldSOURAV CHANDRA
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 

Similar to Chapter 1 (20)

ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Computer
ComputerComputer
Computer
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Chapter 1

  • 1. CHAPTER 1 INFORMATION & COMMUNICATION TECHNOLOGY AND SOCIETY
  • 2. DEFINITION OF ICT ICT is the technology required for information processing, in particular, the use electronics computers, communication devices and application software convert, store, protect, process, transmit and retrieve information from anywhere, anytime.
  • 3. THE USAGE OF ICT IN EVERYDAY LIFE  Education  Students use computer to research for teaching materials, participate in online forum and online conferences  Banking  Customers can make any transaction at 24 hours service centre  Industry  To help in product design by using CAD (Computer Aided Design)  E-commerce  To make buying and selling activities faster and more efficient through internet.
  • 4. DIFFERENCES BETWEEN COMPUTERISED & NON-COMPUTERISED SYSTEM COMPUTERIZED NON-COMPUTERIZED All banking activities are All banking activities were done by using computer done manually system Transaction can be done Transaction can only be anywhere and anytime made during working hours It takes shorten time for It takes long time for any any banking process banking process More productive Less productive
  • 5. THE POSITIVE IMPACT OF ICT ON SOCIETY  Faster communication speed  Lower communication cost  People can share opinions and information through discussion groups and forums through Internet  Paperless environment – information can be stored and retrieved through the digital medium instead of paper.  Information can communication can be borderless through Internet
  • 6. THE NEGATIVE IMPACT OF ICT ON SOCIETY  Borderless information at time can be negative because courage people to access pornography and violence web sites.  Computers can harm users if they use for long hours frequently.
  • 7. 2.0 COMPUTER ETHICS AND LEGAL ISSUES  Computer Ethics  Is a system of moral standards or moral values used as a guideline for computer users.  Code of Ethics  Is a guidelines in ICT that help determine whether a specific computer action is ethical or unethical  Intellectual Property  Is work created by inventors, authors and artists.
  • 8.  Privacy  Refers to the right of individuals and companies to deny or restrict the collection and use of information about them  Computer crime  Is any illegal acts involving computers  Cyber Law  Is any laws relating to protect the Internet and other online communication technologies
  • 9. DIFFERENCES BETWEEN ETHICS AND LAW Ethics Law As a guideline to computer As a rule to control users computer users Computer users are free Computer user must follow to follow or ignore the code the regulations and law of ethics Universal, can be applied Depend on country and anywhere, all over the state where the crime is world committed To produce ethical To prevent misuse of computer users computers No following ethics are No obeying laws are call called immoral crime
  • 10. INTELLECTUAL PROPERTY LAWS  Intellectual Property laws cover ideas, inventions, literary creations, unique names, business modals, industrial processes, computer program codes and many more.  Four types of Intellectual Property are:  Patents for inventions  Trademarks for brand identity  Design for product appearance  Copyright for materials
  • 12. CONTROVERSIAL CONTENTS AND CONTROL  Pornography  Pornography is any form of media or material that show erotic behavior and intended to cause sexual excitement. The effects of pornography on society are:  Can lead to criminal acts such as exploitation of women.  Can lead sexual addiction  can develop lower moral values towards other people  Can erode good religious, cultural, behaviors and beliefs
  • 13. Slander  Slander is a false spoken statement about someone, intended to damage his or her reputation. The effects of slander on society are:  Can develop society that disregards on honesty and truth  Can lead to bad habits of spreading rumors and untruth  Can cause people to have negative attitudes towards another person
  • 14. TOPICS THAT WE WILL LEARN FOR TODAY The process of filtering Cyber law
  • 15. THE PROCESS OF FILTERING  To control access to controversial contents.  The method of choice to limit access on the Internet is to filter either by:  Keyword blocking  Site blocking  Web rating system
  • 16. KEYWORD BLOCKING  This method uses a list of banned word or object terms such as xxx, sex and nude. As the page is downloading, the filter searches for any these words. If found, it will blocked the page completely, stop downloading the page, block the banned words and even shut down the browser.
  • 17. SITE BLOCKING  This method use software to list the web sites that will be blocked by using software. The software also prevents user from being access the web site on list.
  • 18. WEB RATING SYSTEM  Web sites are rating in terms of nudity, sex, violence and language. The web sites rates can be done by setting the browser to only accept pages with certain level of ratings.
  • 19. CYBER LAW  Cyber law is any laws relating to protect the Internet and other online communication technologies.  Examples of cyber abuse on the users:  Sending a computer virus via e-mail  Harassment through e-mail  Hacking into your school’s database to change your examination result  Why we need cyber law:  Cyber law are made to force people to be good  To give protection against the misuse of computers and computer criminal activities
  • 20. Malaysian Cyber Law  Computer Crime Act 1997  Copyright (Amendment) Bill 1997  Digital Signature Act 1997  Telemedicine Bill 1997  Communication and Multimedia Act 1998  Digital Signature Regulations 1998
  • 21. COMPUTER CRIME 1. Computer Fraud 2. Copyright Infringement 3. Theft 4. Attacks
  • 22. COMPUTER FRAUD  Computer fraud is the crime of obtaining money by deceiving (to trick) people through the use of computers. There are many forms of computer frauds which include  E-mail hoaxes (hoax – an attempt to make people believe something that is not true)  Program fraud  Investment scheme  Sales promotions  Claim of expertise on certain fields
  • 23. COPYRIGHT INFRINGEMENT  Copyright infringement is defined as a violation (an action to break the law) of the rights secured by a copyright. Copyright is the legal right to be the only producer or seller of a book, song and film.  Infringement of copyright occurs when you break the copyright law such as copying movie, software or CD’s illegally – selling pirate software.  Piracy is the crime of illegally copying and selling books, tapes, videos, computer programs.
  • 24. COMPUTER THEFT  Computer theft is defined as the unauthorized used of another person’s property. Example of computer theft are  Transfer of payment to the wrong accounts  Get online material with no cost  Tap(memasuki) into data transmission line
  • 25. COMPUTER ATTACKS  Computer attack is defined as any activities taken to disrupt the equipments computer systems, change processing controls and corrupt data.  Computer attack can be in the forms of:  Physical attack  An electronic attack  A computer network attck
  • 26. COMPUTER SECURITY  Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification.  Computer security:  Computer threats  Security measures
  • 27. COMPUTER THREATS  Malicious code  Hacking  Natural disaster  Theft
  • 28. MALICIOUS CODE  Malicious code is a computer program that perform unauthorised processes on a computer or network. There are various kinds of malicious code.  Virus  Worm  Logic bomb : Malicious code that goes off when a specific condition occurs. Example: time bomb.  Trapdoor and backdoor : A feature in a program that allows someone to access the program with special privileges.  Trojan horse: program that performs a useful task while the same time carry out some secret destructive act.
  • 29. DIFFERENCES BETWEEN WORM & VIRUS WORM VIRUS Operates through the Spreads through any network medium Spread copies of itself Spread copies of itself as a stand alone as a program that program attaches to other program
  • 30. A COMPUTER INFECTED BY A VIRUS, WORM OR TROJAN HORSE OFTEN HAS ONE OR MORE OF THE FOLLOWING SYMPTOMS:  Screen displays unusual message or image  Music or unusual sound plays randomly  Available memory is less than expected  Existing programs and files disappear  Files become corrupted
  • 31. HACKING  Hacking refer to unauthorized access to the computer system by a hacker.  A hacker is a person who accesses a computer or network illegally.  A cracker also is someone who accesses a computer or network illegally but has no intent of destroying data, stealing information, or other malicious action.  Both hacker and cracker have advanced computer and network skills.
  • 32. NATURE THREATS  Computer are also threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles.  Examples of natural and environmental disasters are flood, fire, earthquakes, storms, tornados, excessive heat and inadequate power.
  • 33. THEFT  Two type of theft (a) Computer is used to steal money, goods, information and resources. (b) Stealing of computers especially notebook and PDA.  Three approaches to prevent theft: (a) Prevent access by using locks, smart card or password. (b) Prevent portability by restricting the hardware from being moved. (c) Detect and guard all exits and record any hardware.
  • 34. SECURITY MEASURES  Security measures are measures taken as a precaution against theft or espionage or sabotage or possible danger or failure. Usually we use antivirus, cryptography, firewall and data backup to protect sensitive information.  Security procedures:  Anti-virus  Anti-spyware  Firewall  Backup  Cryptography
  • 35. ANTI-VIRUS  Anti-virus is utility program that we use to protect a computer against viruses by identifying and removing computer viruses found in the computer memory, computer storage or incoming e-mails files.  Examples: Norton antivirus, AVG, Kaspersky, Bitdefender and Nod32.
  • 36. ANTI-SPYWARE  Anti-spyware is a utility program that we use to protect the computers from spyware.  Spyware is software or computer program that is designed secretly record and report an individual’s activities on the Internet. Spyware usually enters your system through the Internet, sometimes when you open e-mail or download software especially shareware and freeware.  Examples : Spybot Search and Destroy, Ad-aware and Spyware Blaster.
  • 37. FIREWALL  Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by security policy.  We use firewall to prevent hacking
  • 38. BACKUP  Backup is utility program that makes a copy of all files or selected files that have been saved onto a disk.  Backup data is important when original data is corrupted.
  • 39. CRYPTOGRAPHY  Cryptography is a process of transforming plaintext into ciphertext then back again.  Encryption is a process of converting plaintext into ciphertext.  Decryption is the process of converting ciphertext into plaintext.  We use cryptography to secure the information and prevent hacking or unauthorized access.  Cipher = secret language Plaintext encrypt Ciphertext Plaintext decrypt Ciphertext
  • 40. HUMAN ASPECT  Refer to the user and also the intruder of a computer system. Human aspect security is the hardest aspects to give protection to. The most common problem of human aspect security is the lack of achieving a good information security procedure.